SlideShare a Scribd company logo
1 of 20
Miss. Ketaki Deshmukh
(Amrutvahini College of Engineering)
•   Introduction
•   Existing System
•   Proposed System
•   Architectural Diagram
•   Features
•   Application
•   Future Scope
•   Conclusion
•   References
• A sensor node wirelessly sends messages to a
  base station via multi-hop path




               Fig: Wireless sensor network
• Security of WSNs


• Trust Aware Shell :
  A robust trust aware routing framework for dynamic
   WSNs


  provides trustworthy and energy-efficient route
    effective against harmful attacks
• Hackers aggravate network conditions


• A traditional techniques does not address the
  severe problems:
  tampering nodes
  create traffic collision
  drop or misdirect messages in routes
  jam the communication channel by creating radio
   interference
• Protect WSNs from the harmful attacks exploiting
  the replay of routing information
• Centres on trustworthiness and energy efficiency
• Allow existing routing protocols to incorporate our
  implementation
• No tight time synchronization & known geographic
  information
Selective forwarding


Wormhole attack


Sinkhole attack


Sybil attack
Sinkhole Attack




                  Wormhole
                   Attack
Neighborhood
          Table

        Neighbor
       Energy Cost




Fig. Working of Energy Watcher
ENb = EN–>b + Eb


ENb: Average Energy Cost.
EN–>b:Average Energy Cost of successfully
 delivering a data packet from N to its neighbour
 b.
Eb: Energy Cost for b.
•Trust manager is to get neighbor trust level from a
neighborhood table




    Fig: Example To Illustrate Working Of Trust Manager
Source                                     Destination Node
 node




             Malicious Node                                                           Destination
                                                                                      Node
                                  Source node
            (a)Routing request



Source                                                           Malicious Node
node                                     Destination
                                         Node

                                                               (c)Data conformation
                              Response                         form the destination
          Response            Node 2
          Node 1                                               node
              (b)Routing response
Fig: Trust manager level table
High Throughput
Energy efficient
Scalable
Adaptable
Low Latency
No Balanced Network Load
Denial-Of-Service Attacks cannot be addressed
Mobile Target Detection in the Presence of an
 Anti-Detection Mechanism
Authenticated Routing
Node-to-Node Key Agreement
Secure Military Application
Healthcare Application
Conclusion
• G. Zhan, W. Shi, and J. Deng, “Tarf: A trust-aware routing framework
  for wireless sensor networks,” in Proceeding of the 7th European
  Conference on Wireless Sensor Networks (EWSN’12), 2012.
• F. Zhao and L. Guibas, Wireless Sensor Networks: An Information
  Processing Approach. Morgan Kaufmann Publishers, 2004.
• C. Karlof and D. Wagner, “Secure routing in wireless sensor networks:
  attacks and countermeasures,” in Proceedings of the1st IEEE
  International Workshop on Sensor Network Protocols and
  Applications, 2003.
• M. Jain and H. Kandwal, “A survey on complex wormhole attack in
  wireless ad hoc networks,” in Proceedings of International Con-
  ference on Advances in Computing, Control, and Telecommunication
  Technologies (ACT ’09), 28-29 2009
Design and implementation of TARF: A Trust Aware Routing Framework for Wireless Sensor Networks

More Related Content

Viewers also liked

Using Tiny OS in Wireless Sensor Network
Using Tiny OS in Wireless Sensor NetworkUsing Tiny OS in Wireless Sensor Network
Using Tiny OS in Wireless Sensor NetworkDeeptiman Mallick
 
Wireless sensor networks routing protocols
Wireless sensor networks routing protocolsWireless sensor networks routing protocols
Wireless sensor networks routing protocolssourabhshivtiwari
 
Introduction to Tiny OS
Introduction to Tiny OSIntroduction to Tiny OS
Introduction to Tiny OSSudharsan S
 
Cognitive radio networks
Cognitive radio networksCognitive radio networks
Cognitive radio networksVatsala Sharma
 
Intoduction to TinyOS, nesC and TOSSIM
Intoduction to TinyOS, nesC and TOSSIMIntoduction to TinyOS, nesC and TOSSIM
Intoduction to TinyOS, nesC and TOSSIMPrakhar Bansal
 
OPPORTUNISTIC MULTIPLE ACCESS TECHNIQUES FOR COGNITIVE RADIO NETWORK
OPPORTUNISTIC MULTIPLE ACCESS TECHNIQUES FOR COGNITIVE RADIO NETWORKOPPORTUNISTIC MULTIPLE ACCESS TECHNIQUES FOR COGNITIVE RADIO NETWORK
OPPORTUNISTIC MULTIPLE ACCESS TECHNIQUES FOR COGNITIVE RADIO NETWORKPraktan Patil
 
Routing Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor NetworksRouting Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor NetworksDarpan Dekivadiya
 
M.tech Term paper report | Cognitive Radio Network
M.tech Term paper report | Cognitive Radio Network M.tech Term paper report | Cognitive Radio Network
M.tech Term paper report | Cognitive Radio Network Shashank Narayan
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor NetworksKarthik
 
Networking devices
Networking devicesNetworking devices
Networking devicesrupinderj
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar pptEisha Madhwal
 

Viewers also liked (15)

Using Tiny OS in Wireless Sensor Network
Using Tiny OS in Wireless Sensor NetworkUsing Tiny OS in Wireless Sensor Network
Using Tiny OS in Wireless Sensor Network
 
Wireless sensor networks routing protocols
Wireless sensor networks routing protocolsWireless sensor networks routing protocols
Wireless sensor networks routing protocols
 
Introduction to Tiny OS
Introduction to Tiny OSIntroduction to Tiny OS
Introduction to Tiny OS
 
TinyOS
TinyOSTinyOS
TinyOS
 
Cognitive radio networks
Cognitive radio networksCognitive radio networks
Cognitive radio networks
 
Presentation1
Presentation1Presentation1
Presentation1
 
Intoduction to TinyOS, nesC and TOSSIM
Intoduction to TinyOS, nesC and TOSSIMIntoduction to TinyOS, nesC and TOSSIM
Intoduction to TinyOS, nesC and TOSSIM
 
OPPORTUNISTIC MULTIPLE ACCESS TECHNIQUES FOR COGNITIVE RADIO NETWORK
OPPORTUNISTIC MULTIPLE ACCESS TECHNIQUES FOR COGNITIVE RADIO NETWORKOPPORTUNISTIC MULTIPLE ACCESS TECHNIQUES FOR COGNITIVE RADIO NETWORK
OPPORTUNISTIC MULTIPLE ACCESS TECHNIQUES FOR COGNITIVE RADIO NETWORK
 
TinyOS 2.1 Tutorial: TOSSIM
TinyOS 2.1 Tutorial: TOSSIMTinyOS 2.1 Tutorial: TOSSIM
TinyOS 2.1 Tutorial: TOSSIM
 
Routing Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor NetworksRouting Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor Networks
 
M.tech Term paper report | Cognitive Radio Network
M.tech Term paper report | Cognitive Radio Network M.tech Term paper report | Cognitive Radio Network
M.tech Term paper report | Cognitive Radio Network
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar ppt
 

Similar to Design and implementation of TARF: A Trust Aware Routing Framework for Wireless Sensor Networks

Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...IJSRD
 
Reliability analysis for wireless sensor networks
Reliability analysis for wireless sensor networksReliability analysis for wireless sensor networks
Reliability analysis for wireless sensor networksASQ Reliability Division
 
Fault tolerant energy aware data dissemination protocol in WSN
Fault tolerant energy aware data dissemination protocol in WSNFault tolerant energy aware data dissemination protocol in WSN
Fault tolerant energy aware data dissemination protocol in WSNPrajwal Panchmahalkar
 
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...Sigma web solutions pvt. ltd.
 
Secure routing and data transmission in mobile
Secure routing and data transmission in mobileSecure routing and data transmission in mobile
Secure routing and data transmission in mobileIJCNCJournal
 
Fault tolerance in wsn
Fault tolerance in wsnFault tolerance in wsn
Fault tolerance in wsnElham Hormozi
 
Anveshak: Placing Edge Servers In The Wild
Anveshak: Placing Edge Servers In The WildAnveshak: Placing Edge Servers In The Wild
Anveshak: Placing Edge Servers In The WildNitinder Mohan
 
Performance Evaluation of Wormhole Attack In AODV
Performance Evaluation of Wormhole Attack In AODVPerformance Evaluation of Wormhole Attack In AODV
Performance Evaluation of Wormhole Attack In AODVIJERA Editor
 
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...paperpublications3
 
AODV protocol and Black Hole attack
AODV protocol and Black Hole attackAODV protocol and Black Hole attack
AODV protocol and Black Hole attackRaj Sikarwar
 
Selecting number of forwarding reports
Selecting number of forwarding reportsSelecting number of forwarding reports
Selecting number of forwarding reportsijasa
 
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...ieijjournal
 
An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...
An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...
An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...ieijjournal
 
Ad hoc routing
Ad hoc routingAd hoc routing
Ad hoc routingits
 
Trust Based Routing In wireless sensor Network
  Trust Based  Routing In wireless sensor Network  Trust Based  Routing In wireless sensor Network
Trust Based Routing In wireless sensor NetworkAnjan Mondal
 
Vampire attack in wsn
Vampire attack in wsnVampire attack in wsn
Vampire attack in wsnRicha Kumari
 
Routing_Techniques_in_Wireless_Sensor_Ne.ppt
Routing_Techniques_in_Wireless_Sensor_Ne.pptRouting_Techniques_in_Wireless_Sensor_Ne.ppt
Routing_Techniques_in_Wireless_Sensor_Ne.pptAbyThomas54
 
Cooperative Communication for a Multiple-Satellite Network
Cooperative Communication for a Multiple-Satellite NetworkCooperative Communication for a Multiple-Satellite Network
Cooperative Communication for a Multiple-Satellite Networkchiragwarty
 

Similar to Design and implementation of TARF: A Trust Aware Routing Framework for Wireless Sensor Networks (20)

Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
 
Reliability analysis for wireless sensor networks
Reliability analysis for wireless sensor networksReliability analysis for wireless sensor networks
Reliability analysis for wireless sensor networks
 
Fault tolerant energy aware data dissemination protocol in WSN
Fault tolerant energy aware data dissemination protocol in WSNFault tolerant energy aware data dissemination protocol in WSN
Fault tolerant energy aware data dissemination protocol in WSN
 
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
 
Secure routing and data transmission in mobile
Secure routing and data transmission in mobileSecure routing and data transmission in mobile
Secure routing and data transmission in mobile
 
Fault tolerance in wsn
Fault tolerance in wsnFault tolerance in wsn
Fault tolerance in wsn
 
Anveshak: Placing Edge Servers In The Wild
Anveshak: Placing Edge Servers In The WildAnveshak: Placing Edge Servers In The Wild
Anveshak: Placing Edge Servers In The Wild
 
Performance Evaluation of Wormhole Attack In AODV
Performance Evaluation of Wormhole Attack In AODVPerformance Evaluation of Wormhole Attack In AODV
Performance Evaluation of Wormhole Attack In AODV
 
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
 
AODV protocol and Black Hole attack
AODV protocol and Black Hole attackAODV protocol and Black Hole attack
AODV protocol and Black Hole attack
 
Manet
ManetManet
Manet
 
Selecting number of forwarding reports
Selecting number of forwarding reportsSelecting number of forwarding reports
Selecting number of forwarding reports
 
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...
 
An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...
An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...
An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...
 
Ad hoc routing
Ad hoc routingAd hoc routing
Ad hoc routing
 
Trust Based Routing In wireless sensor Network
  Trust Based  Routing In wireless sensor Network  Trust Based  Routing In wireless sensor Network
Trust Based Routing In wireless sensor Network
 
Vampire attack in wsn
Vampire attack in wsnVampire attack in wsn
Vampire attack in wsn
 
Routing_Techniques_in_Wireless_Sensor_Ne.ppt
Routing_Techniques_in_Wireless_Sensor_Ne.pptRouting_Techniques_in_Wireless_Sensor_Ne.ppt
Routing_Techniques_in_Wireless_Sensor_Ne.ppt
 
SZRP.pdf
SZRP.pdfSZRP.pdf
SZRP.pdf
 
Cooperative Communication for a Multiple-Satellite Network
Cooperative Communication for a Multiple-Satellite NetworkCooperative Communication for a Multiple-Satellite Network
Cooperative Communication for a Multiple-Satellite Network
 

Recently uploaded

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

Design and implementation of TARF: A Trust Aware Routing Framework for Wireless Sensor Networks

  • 1. Miss. Ketaki Deshmukh (Amrutvahini College of Engineering)
  • 2. Introduction • Existing System • Proposed System • Architectural Diagram • Features • Application • Future Scope • Conclusion • References
  • 3. • A sensor node wirelessly sends messages to a base station via multi-hop path Fig: Wireless sensor network
  • 4. • Security of WSNs • Trust Aware Shell : A robust trust aware routing framework for dynamic WSNs provides trustworthy and energy-efficient route effective against harmful attacks
  • 5. • Hackers aggravate network conditions • A traditional techniques does not address the severe problems: tampering nodes create traffic collision drop or misdirect messages in routes jam the communication channel by creating radio interference
  • 6. • Protect WSNs from the harmful attacks exploiting the replay of routing information • Centres on trustworthiness and energy efficiency • Allow existing routing protocols to incorporate our implementation • No tight time synchronization & known geographic information
  • 8. Sinkhole Attack Wormhole Attack
  • 9.
  • 10. Neighborhood Table Neighbor Energy Cost Fig. Working of Energy Watcher
  • 11. ENb = EN–>b + Eb ENb: Average Energy Cost. EN–>b:Average Energy Cost of successfully delivering a data packet from N to its neighbour b. Eb: Energy Cost for b.
  • 12. •Trust manager is to get neighbor trust level from a neighborhood table Fig: Example To Illustrate Working Of Trust Manager
  • 13. Source Destination Node node Malicious Node Destination Node Source node (a)Routing request Source Malicious Node node Destination Node (c)Data conformation Response form the destination Response Node 2 Node 1 node (b)Routing response
  • 14. Fig: Trust manager level table
  • 16. Low Latency No Balanced Network Load Denial-Of-Service Attacks cannot be addressed
  • 17. Mobile Target Detection in the Presence of an Anti-Detection Mechanism Authenticated Routing Node-to-Node Key Agreement Secure Military Application Healthcare Application
  • 19. • G. Zhan, W. Shi, and J. Deng, “Tarf: A trust-aware routing framework for wireless sensor networks,” in Proceeding of the 7th European Conference on Wireless Sensor Networks (EWSN’12), 2012. • F. Zhao and L. Guibas, Wireless Sensor Networks: An Information Processing Approach. Morgan Kaufmann Publishers, 2004. • C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures,” in Proceedings of the1st IEEE International Workshop on Sensor Network Protocols and Applications, 2003. • M. Jain and H. Kandwal, “A survey on complex wormhole attack in wireless ad hoc networks,” in Proceedings of International Con- ference on Advances in Computing, Control, and Telecommunication Technologies (ACT ’09), 28-29 2009